Music News

Here’s why you shouldn’t download this JPEG of Taylor Swift

If you’re a Taylor Swift fan, you might want to hold off downloading any new images of her.

Mining cryptocurrency takes a lot of distributed computing power. To achieve the scale necessary, you can (a) invest a lot of money in building banks of servers (and the electricity it takes to run them) or (b) co-opt other people’s machines by turning them into mining zombies.

A crytocurrency-mining botnet that goes by the name MyKingz, Smoinru, DarkCloud, and Hexman is using a technique called steganography to infect personal computers with malware. Basically, malicious files are hidden inside legitimate ones. Once on your machine, the malware gets installed.

One of the files this group is using is a .jpeg of Taylor Swift. There’s a little .exe file lurking within the image, which runs the moment the image lands on a machine.

This is apparently the image in question (Don’t worry: This is an image of an image of an image. The .exe is not here.)

According to TNW, more than half a million Windows systems have been infected resulting in the creating of more than US$2.3 million worth of crypto called Monero.

Read more here.

Alan Cross

is an internationally known broadcaster, interviewer, writer, consultant, blogger and speaker. In his 40+ years in the music business, Alan has interviewed the biggest names in rock, from David Bowie and U2 to Pearl Jam and the Foo Fighters. He’s also known as a musicologist and documentarian through programs like The Ongoing History of New Music.

Alan Cross has 38031 posts and counting. See all posts by Alan Cross

3 thoughts on “Here’s why you shouldn’t download this JPEG of Taylor Swift

  • This is entirely false and you should take it down.

    This is not at all how this works.

    Reply
    • Explain. Did you follow the link to the original article?

      Reply
    • My first reaction was that this is BS, but I remembered there historically was a vulnerability in the library (GDI) that Windows uses to display images … iirc it was over ten years ago at this point.

      While trying to Google it though, I stumbled across an apparent modern version of the same thing: https://fortiguard.com/encyclopedia/endpoint-vuln/56005

      Reply

Let us know what you think!

This site uses Akismet to reduce spam. Learn how your comment data is processed.